当前位置:首页 > 网络安全 > 安全通告 > 详情
安全漏洞预警通告-Windows DNS 服务器 远程代码执行漏洞(CVE-2018-8626)预警
2018年12月14日   
  1、基本情况
  Windows DNS 服务器中存在的一处远程代码执行漏洞,CVE编号:CVE-2018-8626。
  2、攻击原理
  Windows DNS(Domain Name System)服务器处理请求时存在缺陷,从而导致存在远程执行代码漏洞。远程且未经授权的攻击者通过向 Windows DNS 服务端发送精心构造的恶意请求,即能以本地系统账户权限执行任意代码。
  3、影响范围
  以下 Windows 系统配置为 DNS 服务器时会受此漏洞的影响:
  Windows 10 Version 1607 for 32-bit Systems
  Windows 10 Version 1607 for x64-based Systems
  Windows 10 Version 1709 for 32-bit Systems
  Windows 10 Version 1709 for 64-based Systems
  Windows 10 Version 1709 for ARM64-based Systems
  Windows 10 Version 1803 for 32-bit Systems
  Windows 10 Version 1803 for ARM64-based Systems
  Windows 10 Version 1803 for x64-based Systems
  Windows 10 Version 1809 for 32-bit Systems
  Windows 10 Version 1809 for ARM64-based Systems
  Windows 10 Version 1809 for x64-based Systems
  Windows Server 2012 R2
  Windows Server 2012 R2 (Server Core installation)
  Windows Server 2016
  Windows Server 2016 (Server Core installation)
  Windows Server 2019
  Windows Server 2019 (Server Core installation)
  Windows Server, version 1709 (Server Core Installation)
  Windows Server, version 1803 (Server Core Installation)
  4、处置建议
  微软官方已发布安全补丁,下载地址:
  https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8626
  5、参考链接
  1) https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8626